Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)
Cover image for Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

1
Comments
7 min read
JWT Is Not Secure — Until You Understand JWS and JWE
Cover image for JWT Is Not Secure — Until You Understand JWS and JWE

JWT Is Not Secure — Until You Understand JWS and JWE

5
Comments
3 min read
"Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome
Cover image for "Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome

"Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome

Comments
2 min read
Building Own Block Cipher: Part 3 - AES
Cover image for Building Own Block Cipher: Part 3 - AES

Building Own Block Cipher: Part 3 - AES

Comments
6 min read
Building a Home SOC Lab

Building a Home SOC Lab

Comments
2 min read
Week 2 Scripting Challenge: Log Parser
Cover image for Week 2 Scripting Challenge: Log Parser

Week 2 Scripting Challenge: Log Parser

2
Comments
12 min read
Anthropic highlights risks of emergent misalignment and reward hacking in AIsystems research
Cover image for Anthropic highlights risks of emergent misalignment and reward hacking in AIsystems research

Anthropic highlights risks of emergent misalignment and reward hacking in AIsystems research

Comments
2 min read
Hacking Ético

Hacking Ético

Comments
1 min read
How to Prevent Objects from Being Modified in JavaScript
Cover image for How to Prevent Objects from Being Modified in JavaScript

How to Prevent Objects from Being Modified in JavaScript

Comments
2 min read
What breaks trust in authentication UX

What breaks trust in authentication UX

4
Comments 1
3 min read
Critical Security Vulnerability Found in React Server Components (RSC)

Critical Security Vulnerability Found in React Server Components (RSC)

2
Comments 1
1 min read
Implementing Authentication Middleware in Next.js with i18n Support
Cover image for Implementing Authentication Middleware in Next.js with i18n Support

Implementing Authentication Middleware in Next.js with i18n Support

Comments
3 min read
Support is the weakest link in authentication (unless you design it not to be)
Cover image for Support is the weakest link in authentication (unless you design it not to be)

Support is the weakest link in authentication (unless you design it not to be)

5
Comments 6
3 min read
SENTINEL: The Only Production-Ready Open-Source AI Security Gateway (170 Engines)

SENTINEL: The Only Production-Ready Open-Source AI Security Gateway (170 Engines)

Comments
2 min read
Hunting Coyote: A Full Analysis of the 0LIONW0 AutoIt3 RAT

Hunting Coyote: A Full Analysis of the 0LIONW0 AutoIt3 RAT

2
Comments
17 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.